Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
21-11-2023 06:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go2.inndts.com/NzMyLVdNRS05MDMAAAGPfbMSB8qeCdQIehd5TUv8pyMH7yveuaK5HWccw0Rug0JFOGELSqsYXqb_rszxSrMTn8Gqnwg=
Resource
win10-20231020-en
General
-
Target
https://go2.inndts.com/NzMyLVdNRS05MDMAAAGPfbMSB8qeCdQIehd5TUv8pyMH7yveuaK5HWccw0Rug0JFOGELSqsYXqb_rszxSrMTn8Gqnwg=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133450213395507469" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4592 chrome.exe 4592 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe Token: SeShutdownPrivilege 4592 chrome.exe Token: SeCreatePagefilePrivilege 4592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe 4592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 3596 4592 chrome.exe 71 PID 4592 wrote to memory of 3596 4592 chrome.exe 71 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 4680 4592 chrome.exe 74 PID 4592 wrote to memory of 1116 4592 chrome.exe 73 PID 4592 wrote to memory of 1116 4592 chrome.exe 73 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75 PID 4592 wrote to memory of 712 4592 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go2.inndts.com/NzMyLVdNRS05MDMAAAGPfbMSB8qeCdQIehd5TUv8pyMH7yveuaK5HWccw0Rug0JFOGELSqsYXqb_rszxSrMTn8Gqnwg=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaeeaf9758,0x7ffaeeaf9768,0x7ffaeeaf97782⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:22⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3728 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=840 --field-trial-handle=1788,i,9903325073450706833,9506771590087944387,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\60ac198e-618b-41cc-8173-088eba6e4272.tmp
Filesize6KB
MD5824cef6c442874600316eff5e93b6992
SHA1f28151ba199ec45cb02f03fc3022b53cb7ab2b3e
SHA256b2c6dd85ed70168eb2b4d0d244eac75e5adb22edd77294484c451263346910c8
SHA512fdd5933b43da81e791cad2e775c91490c52de44039458b16d5ca88c255e049d908cae0dd5e003db4c09975529a7c0ed27147174444035bae59fbb7400fc35392
-
Filesize
1KB
MD5afa7e6ef80f7d5e49863ea7b3c6e84ec
SHA17ae92acc54faaf8a683cb1109119da5706e21462
SHA2561ce0c0be7e0484c06006337070d05170768e39aeb3d69f841eb033a297a82ef4
SHA512584b8c0a51462fec6406bed57e3cf82060a7c40e2b1487d1b9ec164827f1e4545d5fd47941c1bb864535bb7ef10c76a52ef3459e999ec5f632ff94e699786c69
-
Filesize
3KB
MD5838eb0eb14fff798c0e43d68c2401f16
SHA19299591fd882c78f6ad873841200c94d4fbcc385
SHA25675fb010bfa2feeb48f6efaabee3988270e91b637f9ea2a42fd2923944f4fd4cc
SHA5125e86e93ddf35e8352bd42e082e4c01922844ca974d807f568cdfb2a756b7988851434d66962d471dae0a207e9dc9f136abe20073d0fa0ea46d44183f91a4ad64
-
Filesize
3KB
MD52cf2a0c618670d75aa007bf0c6a83546
SHA15137b75f047145dfe0d8468f8c9396cde539751e
SHA256d27397b556b62668edd0f1bcfe7ce4c34db460298dea9886c70cd5ce54f1fbc0
SHA51205b859d7323808c1d76e591d99f6bc54022e07ae3ed146bbfafb7fd4dc38caf46fee60194e8780d7be4dcf54bed0bda7cf1f839a1948f5153356b40b8674003c
-
Filesize
2KB
MD5b996a5e62c0323c8df3ff910e04c74cf
SHA12c4d80ae74454264f4387eb80b4ad99a7a93e2a8
SHA256949d4c92686be1737bada65557ee4b4c117b6b1c544576cf430bdc9b421a9064
SHA512b9c9a2c896edbc9ce32412394f51b031cd944a9acc67664a50e37028a60bde7e8815e25161f4b9d3463f3861bf967b31b11c60e3aa0962b20e856e6aa02dc3d8
-
Filesize
2KB
MD504f28e216fec5467e822ae11ad2fb541
SHA121e7ea9620ba3eaf71d30f229518563445854e43
SHA256f6d8cad98f5a470dce024692475764c923824f83ae80601d506da9afddee0ff8
SHA512e0279f0f9e6208b024111fafb78a0a0a630dd3973ee0ddcc02e8fccf1171ed6e79fc971580262a88aabad1b3346807f7674a2e9b222ef25ff9f7837f2f3c8c5d
-
Filesize
6KB
MD5290dd744ac2bb67806d0b657ed57c9e6
SHA12e962fe9950b3b6a0dd8c021e00a6cffa65200da
SHA25657c2e901d9c920a8d4adddfa181a0f4b546870da4b931c9a7b1adaf01f91e0a6
SHA512e173da52232672986f6565830daf63940cc4ee7cc1d5a709c23346e3a1fefb8905f48229d136a526d39c8924ade9e5b71cf534647c696a6e99a4176a5c7f8dd7
-
Filesize
6KB
MD5a188866606e95efe055a5aad80ccd4c2
SHA12e197751189595d5c13799be875ffc2e4d6e33e8
SHA256db7b56f54846913d700877912446d7c26ceeba9680d5aa3c0e8cfe69a5eb981f
SHA512e25e2b74233eb8f81af736fc27c7d4686f63f0d04de1fcc2cf47281680df3df3e2e0bbef42b8f5e013bd317fde2ebfe7b6cde7fd00abcd44f2fa1c4e9d150f31
-
Filesize
209KB
MD54c5bcf94035aa1fc05fdab0b54793a8f
SHA1c8f6315bc666cdd48838592544a15d4cf56347ab
SHA256e5a73035331364b8017b3b0596fc64c3b3ed454b0c553b7c4070e37e1f9996db
SHA5126dfa21f1cc833a27691acc36b10ef2a235de61d9816618bcf8e50b09dcc39155845b779d7016d8a45cf92d4a91c298d8d7b3eaf1056c8b1bc479c2ec17ee3aa2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd